FREAK, a newly-discovered flaw in SSL/TLS, the technology which is supposed to secure your communications across the net, has been discovered.
Here's what you need to know.
Ever felt let down by someone who you made a promise, and then broke it? That's what millions of Android users must be feeling right now when it comes to Google and Android.
Read more in my article on the Hot for Security blog.
Hillary Clinton might be in hot water after it is revealed that she never had an official email account, but was instead using a personal one. That's potentially a breach of federal law, but it's definitely a security risk.
Read more in my article on the We Live Security blog.
Credit card fraud enabled by Apple Pay is "rampant" according to one mobile-payments specialist. So, how is it done?
Read more in my article on the Intego Mac Security blog.
Gemalto says it was hacked, and believes it could have been the NSA or GCHQ who did it.
So how should different countries respond to the reports that secure mobile phone communications may now be compromised? Watch this video to see what Australian spooks had to say.
Good luck to everyone - and may the best Dr Who-loving British security blogger based in Oxford win. :)
Chuck Norris is certainly tough. But could just invoking his name allow Facebook employees to access any user's account?
Australian attorney-general George Brandis bombarded with messages to his smartphone, including the first chapter of "1984".
There's no test for common sense before you're elected to be a member of the British Parliament.
Make sure you're protecting your privacy on Instagram, and not revealing too much personal information.
My sincere thanks to DDoS mitigation and testing specialists activereach, who sponsored my writing this week, and for the next couple of weeks. Thanks guys!
Receive part one of activereach's free "Guide to DDoS and mitigation 2015" now and also receive "Assessing the risk to business of DDoS attacks" and "Aspects of DDoS mitigation testing" free over the next few weeks.
In part one of the guide to DDoS and mitigation, Max Pritchard of activereach looks at the history of distributed denial-of-service attacks, describes the way DDoS attacks are categorised and examines the mitigation techniques and solutions that are being employed by companies today.